Sciweavers

468 search results - page 65 / 94
» Symmetric majority rules
Sort
View
PADS
2009
ACM
15 years 4 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu
KDD
2009
ACM
184views Data Mining» more  KDD 2009»
15 years 4 months ago
Thumbs-Up: a game for playing to rank search results
Human computation is an effective way to channel human effort spent playing games to solving computational problems that are easy for humans but difficult for computers to autom...
Ali Dasdan, Chris Drome, Santanu Kolay, Micah Alpe...
IOLTS
2009
IEEE
174views Hardware» more  IOLTS 2009»
15 years 4 months ago
ATPG-based grading of strong fault-secureness
—Robust circuit design has become a major concern for nanoscale technologies. As a consequence, for design validation, not only the functionality of a circuit has to be considere...
Marc Hunger, Sybille Hellebrand, Alejandro Czutro,...
TPHOL
2009
IEEE
15 years 4 months ago
The HOL-Omega Logic
A new logic is posited for the widely used HOL theorem prover, as an extension of the existing higher order logic of the HOL4 system. The logic is extended to three levels, adding ...
Peter V. Homeier
BPM
2009
Springer
143views Business» more  BPM 2009»
15 years 4 months ago
Integrating Users in Object-Aware Process Management Systems: Issues and Challenges
Despite the increasing maturity of contemporary Workflow Management Systems (WfMS), there still exist numerous process-aware application systems with more or less hard-coded proce...
Vera Künzle, Manfred Reichert